Odisha News, Odisha Latest news, Odisha Daily - OrissaPOST
  • Home
  • Trending
  • State
  • Metro
  • National
  • International
  • Business
  • Feature
  • Entertainment
  • Sports
  • More..
    • Odisha Special
    • Editorial
    • Opinion
    • Careers
    • Sci-Tech
    • Timeout
    • Horoscope
    • Today’s Pic
  • Video
  • Epaper
  • News in Odia
  • Home
  • Trending
  • State
  • Metro
  • National
  • International
  • Business
  • Feature
  • Entertainment
  • Sports
  • More..
    • Odisha Special
    • Editorial
    • Opinion
    • Careers
    • Sci-Tech
    • Timeout
    • Horoscope
    • Today’s Pic
  • Video
  • Epaper
  • News in Odia
No Result
View All Result
OrissaPOST - Odisha Latest news, English Daily -
No Result
View All Result

This is how ransomware variants attack users

IANS
Updated: February 11th, 2020, 19:55 IST
in Sci-Tech
0
Representational image

Representational image

Share on FacebookShare on TwitterShare on WhatsAppShare on Linkedin

New Delhi: There are three main modes of distribution for the major ransomware families that are poised to increase their attacks this year, security researchers warned on the occasion of Safer Internet Day Tuesday.

One of the ways ransomware spreads is by replicating itself rapidly to other computers for maximum impact, researchers from cybersecurity firm Sophos said in a report ‘How Ransomware Attacks’, a playbook for defenders that explains how ransomware variants attack and impact victims.

Also Read

Epic Games drops app store-related antitrust lawsuit against Samsung

10 hours ago
EV Policy

EV sales in India rise 28.6% to 1,80,238 in June: FADA

10 hours ago

Ransomware that spread by replicating itself is called a ‘cryptoworm’. The WannaCry attack that caused damage worldwide in 2017 is an example of this kind of ransomware.

These malware also spread as ransomware-as-a-service (RaaS) which are sold on the dark web as a distribution kit (for example, Sodinokibi).

The third most common way of their spread is as automated active adversary attack, where attackers manually deploy the ransomware following an automated scan of networks for systems with weak protection.

This automated, active attack style was the most common approach seen among the top families listed in the report which includes detailed analysis of 11 of the most prevalent and persistent ransomware families, including Ryuk, BitPaymer and MegaCortex.

The research highlights how ransomware tries to slip unnoticed past security controls by abusing trusted and legitimate processes, and then harnesses internal systems to encrypt the maximum number of files and disable backup and recovery processes before an IT security team catches up.

“The creators of ransomware have a pretty good grasp of how security software works and adapt their attacks accordingly. Everything is designed to avoid detection while the malware encrypts as many documents as possible as quickly as possible and makes it hard, if not impossible, to recover the data,” said Mark Loman, Director of Engineering for Threat Mitigation Technology at Sophos, and the author of the report.

“In some cases, the main body of the attack takes place at night when the IT team is at home asleep. By the time the victim spots what’s going on, it is too late. It is vital to have robust security controls, monitoring and response in place covering all endpoints, networks and systems, and to install software updates whenever they are issued,” Loman said.

To protect against ransomware, check that you have a full inventory of all devices connected to your network and that any security software you use on them is up to date, the researchers recommended.

Always install the latest security updates, as soon as practicable, on all the devices on your network.

You should also keep regular backups of your most important and current data on an offline storage device as this is the best way to avoid having to pay a ransom when affected by ransomware, the researchers said.

Administrators should enable multi-factor authentication on all management systems that support it, to prevent attackers disabling security products during an attack, they added.

(IANS)

Tags: cryptowormDark WebRaaSRansomwareWannaCry
ShareTweetSendShare
Suggest A Correction

Enter your email to get our daily news in your inbox.

 

OrissaPOST epaper Sunday POST OrissaPOST epaper

Click Here: Plastic Free Odisha

#MyPaperBagChallenge

Smitarani Sahoo

December 12, 2019
#MyPaperBagChallenge

Pratyasharani Ghibela

December 12, 2019
#MyPaperBagChallenge

Adrita Bhattacharya

December 12, 2019
#MyPaperBagChallenge

Shreyanshu Bal

December 12, 2019
#MyPaperBagChallenge

Ramakanta Sahoo

December 12, 2019
#MyPaperBagChallenge

Keshab Chandra Rout

December 12, 2019
#MyPaperBagChallenge

Lopali Pattnaik

December 12, 2019
#MyPaperBagChallenge

Jyotshna Mayee Pattnaik

December 12, 2019
#MyPaperBagChallenge

Pitabas Tripathy

December 12, 2019
#MyPaperBagChallenge

Praptimayee Biswal

December 12, 2019
#MyPaperBagChallenge

Diptiranjan Biswal

December 12, 2019
#MyPaperBagChallenge

Pragyan Priyambada

December 12, 2019
#MyPaperBagChallenge

Jhili Jena

December 12, 2019
#MyPaperBagChallenge

D Rama Rao

December 12, 2019
#MyPaperBagChallenge

Ipsita

December 12, 2019
#MyPaperBagChallenge

Anasuya Sahoo

December 12, 2019
#MyPaperBagChallenge

Aishwarya Ranjan Mohanty

December 12, 2019
#MyPaperBagChallenge

Mandakini Dakua

December 12, 2019
#MyPaperBagChallenge

Faiza Firdous

December 12, 2019
#MyPaperBagChallenge

Chinmay Kumar Routray

December 12, 2019
#MyPaperBagChallenge

Bijswajit Pradhan

December 12, 2019
#MyPaperBagChallenge

Subhajyoti Mohanty

December 12, 2019
#MyPaperBagChallenge

Sibarama Khotei

December 12, 2019
#MyPaperBagChallenge

Anshuman Sahoo

December 12, 2019
#MyPaperBagChallenge

Sarfraz Ahmad

December 12, 2019
#MyPaperBagChallenge

Sarmistha Nayak

December 12, 2019
#MyPaperBagChallenge

Mrutyunjaya Behera

December 12, 2019
#MyPaperBagChallenge

Rajashree Pravati Mohanty

December 12, 2019
#MyPaperBagChallenge

Amritansh Mishra

December 12, 2019
#MyPaperBagChallenge

Nishikant Rout

December 12, 2019

Archives

Editorial

Bloodline

BJP-Shiv Sena
July 8, 2025

The coming together of the Thackeray cousins – Raj Thackeray, chief of the Maharashtra Navnirman Sena (MNS) and Shiv Sena...

Read more

Acknowledge Failure

Deputy Chief of Army Staff Lieutenant General Rahul R Singh
July 7, 2025

Deputy Chief of Army Staff Lieutenant General Rahul R Singh’s candid revelations about Operation Sindoor at a FICCI event ‘New...

Read more

Politics of Philosophy

AAKAR PATEL
July 6, 2025

The BJP’s constitution (Article 3) says, “Integral Humanism shall be the philosophy of the party.” The party’s membership form has...

Read more

India’s Spy Shift

July 5, 2025

India’s espionage architecture is quietly shifting. The appointment of Parag Jain as the new chief of RAW comes at a...

Read more
  • Home
  • State
  • Metro
  • National
  • International
  • Business
  • Editorial
  • Opinion
  • Sports
  • About Us
  • Advertise
  • Contact Us
  • Jobs
Developed By Ratna Technology

© 2024 All rights Reserved by OrissaPOST

  • News in Odia
  • Orissa POST Epaper
  • Video
  • Home
  • Trending
  • Metro
  • State
  • Odisha Special
  • National
  • International
  • Sports
  • Business
  • Editorial
  • Entertainment
  • Horoscope
  • Careers
  • Feature
  • Today’s Pic
  • Opinion
  • Sci-Tech
  • About Us
  • Contact Us
  • Jobs

© 2024 All rights Reserved by OrissaPOST

    • News in Odia
    • Orissa POST Epaper
    • Video
    • Home
    • Trending
    • Metro
    • State
    • Odisha Special
    • National
    • International
    • Sports
    • Business
    • Editorial
    • Entertainment
    • Horoscope
    • Careers
    • Feature
    • Today’s Pic
    • Opinion
    • Sci-Tech
    • About Us
    • Contact Us
    • Jobs

    © 2024 All rights Reserved by OrissaPOST